Recent posts

TypePostAuthorRepliesLast updated
Book pageAPPENDIX B: The Infection Process jamie.riden08 years 16 weeks ago
Book pageAPPENDIX A: Fast-Flux Proxy Samples jamie.riden08 years 16 weeks ago
Book pageAPPENDICES jamie.riden08 years 16 weeks ago
Book pageACKNOWLEDGEMENTS jamie.riden08 years 16 weeks ago
Book pageSUMMARY jamie.riden08 years 16 weeks ago
Book pageDETECTION & MITIGATION jamie.riden08 years 16 weeks ago
Book pageSTATISTICS jamie.riden08 years 16 weeks ago
ImageFlux HTTP pie jamie.riden08 years 16 weeks ago
ImageFlux DNS pie jamie.riden08 years 16 weeks ago
Book pageFAST-FLUX CASE STUDY jamie.riden08 years 16 weeks ago
Book pageFAST-FLUX MALWARE jamie.riden08 years 16 weeks ago
Book pageREAL WORLD FAST-FLUX EXAMPLES jamie.riden08 years 16 weeks ago
Book pageADVANTAGES FOR THE ATTACKER jamie.riden08 years 16 weeks ago
Book pageSINGLE-FLUX NETWORKS jamie.riden08 years 16 weeks ago
Book pageDOUBLE-FLUX SERVICE NETWORKS jamie.riden08 years 16 weeks ago
ImageFast flux DNS diagram jamie.riden08 years 16 weeks ago
Book pageHOW FAST-FLUX SERVICE NETWORKS WORK jamie.riden08 years 16 weeks ago
ImageFast flux web diagram jamie.riden08 years 16 weeks ago
Book pageDetailed analysis of two phishing incidents drupal08 years 16 weeks ago
Book pageHoneysnap sample output drupal08 years 16 weeks ago
Book pageRedirected Phishing Victims drupal08 years 16 weeks ago
Book pageGerman PHP script analysis drupal08 years 16 weeks ago
Book pageAnalysis of German attacker's sessions drupal08 years 16 weeks ago
Book pageDetails of German compromise drupal08 years 16 weeks ago
Book pageSetup and Timeline for UK Honeynet Project Phishing Incident drupal08 years 16 weeks ago